Lore is a WEB-based article management system. Lore does not fully Filter user-submitted URIs. remote attackers can exploit this vulnerability to launch SQL injection attacks to obtain sensitive information. The problem is that the Article. php script does not fully Filter user-submitted id parameters. when malicious SQL queries are submitted as parameter data, the original SQL logic can be changed to obtain sensitive information or possibly operate the database. BUGTRAQID: 15665C vulnerability information
Lore is a WEB-based article management system.
Lore does not fully Filter user-submitted URIs. remote attackers can exploit this vulnerability to launch SQL injection attacks to obtain sensitive information.
The problem is 'article. the php' script does not fully Filter user-submitted 'id' parameters. when malicious SQL queries are submitted as parameter data, the original SQL logic can be changed to obtain sensitive information or possibly operate the database.
Bugtraq id: 15665
Cncan id: CNCAN-2005120207
Vulnerability message time: 2005-12-01
Vulnerability cause
Input verification error
IMPACT system
Lore 1.5.4
Hazards
Remote Attackers can exploit this vulnerability to inject SQL statements to obtain sensitive information.
Attack conditions
Attackers must access Lore.
Test method
Http://www.example.com/article.php? Id = 1 [SQL]
Vendor Solutions
Currently, no solutions are available. follow these links:
Http://www.pineappletechnologies.com/PRoducts/lore
Vulnerability provider
R0t
Vulnerability message link
Http://pridels.blogspot.com/2005/12/lore-sql-inj-vuln.html
Vulnerability message title
Lore SQL inj. vuln.